Cloud security

Overview

Rise of cloud computing

Cloud computing provides the tools and technologies to build data-intensive parallel applications more affordably than traditional techniques. Furthermore, clouds can offer the bandwidth to build artificial intelligence through data aggregation and analysis. Many Internet of Things (IoT) devices (nodes) can connect to different servers quickly and efficiently over the cloud.

Given these benefits, many global corporations are migrating business processes to cloud solutions that offer high scalability and cost-effectiveness within an infrastructure that is agile and adaptive to their specific needs. Cloud providers offer cloud services and intelligence for edge servers and devices, such as on-premise gateways. These devices are connected to a multitude of IoT end points in environments such as smart infrastructures, smart cities, smart factories and smart homes.

Security remains the key enabler for cloud service adoption.

Security challenges

With millions of devices connected to the IoT, both manufacturers and consumers need to be sure that the identity of each and every device is genuine. Trusted device identities form the very basis for secured cloud connectivity and cloud computing. Therefore device identities need the best protection possible.

Moving customer IP and confidential information from on-premise equipment to the cloud or edge exposes that sensitive data to higher risks, for instance in the Industrial IoT. In simple terms, attackers have easier access to data that is aggregated and analyzed at the edge or in the cloud. The same applies to smart homes as they move more and more data to gateways and routers.

Device manufacturers are thus challenged to protect both the identity and integrity of cloud-connected devices, whether they be compute-intensive edge devices, consumer devices or IoT end nodes such as sensors. This protection is essential to enable secured zero-touch provisioning and secured lifecycle management of IoT devices.

Overcoming today’s cloud security challenge

The necessary level of protection can only be achieved by combining software security mechanisms with robust hardware-based security capabilities based on globally accepted industrial and IT security standards.

Here at Infineon, we deliver hardware-based security solutions designed specifically to harden the identity and protect the integrity of cloud- and edge-connected devices. These solutions serve the entire cloud ecosystem from cloud service and platform providers through manufacturers of ICT server equipment and high-power edge devices such as gateways to designers of connected industrial and consumer IoT devices and IoT end nodes such as sensors.

Integration and deployment made easy

All of our OPTIGA™ products are characterized by ease of integration and compliance with rigorous cloud security standards. Standout features include lighter-weight host code for easier deployment, ready-to-use toolkits and open-source software stacks.

Reflecting our commitment to ease of deployment, we complement our best-in-class hardware with a software development environment that simplifies the integration and secured delivery of IoT applications for customers.

Our security solutions are being validated by leading global cloud service providers to confirm ease of integration and optimum interoperability in their platform architectures.

Documents

Boards

S2GO SECURITY OPTIGA™ Trust X

Infineon’s Shield2Go Security OPTIGA™ Trust X boards offer a unique customer and evaluation experience – the boards are equipped with one OPTIGA™ Trust X security chip and come with a ready to use Arduino library.

In order to optimize your browsing experience Infineon uses cookies. You agree to the usage of cookies when you continue browsing this site. For more information regarding cookies and the processing of your personal data please read our Privacy Policy.